메뉴 건너뛰기




Volumn , Issue , 2008, Pages 165-173

Automated detection of code vulnerabilities based on program analysis and model checking

Author keywords

[No Author keywords available]

Indexed keywords

CODES (SYMBOLS); COMPUTER SOFTWARE; MODAL ANALYSIS; OPEN SYSTEMS; SOFTWARE RELIABILITY; TRACE ANALYSIS;

EID: 56349123085     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SCAM.2008.24     Document Type: Conference Paper
Times cited : (28)

References (27)
  • 1
    • 84949505015 scopus 로고    scopus 로고
    • ITS4: A Static Vulnerability Scanner for C and C++ Code
    • December
    • J. Viega, J.T. Bloch, T. Kohno, and G. McGraw, "ITS4: A Static Vulnerability Scanner for C and C++ Code", In ACSAC, December. 2000, pp. 257-267,
    • (2000) In ACSAC , pp. 257-267
    • Viega, J.1    Bloch, J.T.2    Kohno, T.3    McGraw, G.4
  • 2
    • 34247539967 scopus 로고    scopus 로고
    • Comparing Lexical Analysis Tools for Buffer Overflow Detection in Network Software
    • January
    • D. Pozza, R. Sisto, "Comparing Lexical Analysis Tools for Buffer Overflow Detection in Network Software", In COMSWARE, January. 2006, pp. 1-7.
    • (2006) In COMSWARE , pp. 1-7
    • Pozza, D.1    Sisto, R.2
  • 3
    • 85011293817 scopus 로고
    • LCLint: A Tool for Using Specification to Check Code
    • December
    • D. Evans, J. Guttag, J. Homing, and Y.M. Tan, "LCLint: A Tool for Using Specification to Check Code", In SIGSOFT FSE, December. 1994, pp. 87-96.
    • (1994) In SIGSOFT FSE , pp. 87-96
    • Evans, D.1    Guttag, J.2    Homing, J.3    Tan, Y.M.4
  • 4
    • 33244470892 scopus 로고    scopus 로고
    • Improving Software Security with a C Pointer Analysis
    • May
    • D. Avots, M. Dalton, V.B. Livshits, and M.S. Lam, "Improving Software Security with a C Pointer Analysis", In ICSE, May. 2005, pp. 332-341.
    • (2005) In ICSE , pp. 332-341
    • Avots, D.1    Dalton, M.2    Livshits, V.B.3    Lam, M.S.4
  • 6
    • 35348951470 scopus 로고    scopus 로고
    • The Software Model Checker Blast: Applications to Software Engineering
    • D. Beyer, T.A. Henzinger, R. Jhala, and R. Majumdar, "The Software Model Checker Blast: Applications to Software Engineering", In STTT, 2007, pp. 505-525.
    • (2007) In STTT , pp. 505-525
    • Beyer, D.1    Henzinger, T.A.2    Jhala, R.3    Majumdar, R.4
  • 8
    • 85081874807 scopus 로고    scopus 로고
    • A first step towards automated detection of buffer overrun vulnerabilities
    • D. Wagner, J. Foster, E. Brewer, and A. Aiken. "A first step towards automated detection of buffer overrun vulnerabilities", In NDSS, 2000, pp. 3-17.
    • (2000) In NDSS , pp. 3-17
    • Wagner, D.1    Foster, J.2    Brewer, E.3    Aiken, A.4
  • 9
    • 0029180092 scopus 로고
    • Formal language, grammar and set-constraint-based program analysis by abstract interpretation
    • Oct
    • P. Cousot, P. Cousot, "Formal language, grammar and set-constraint-based program analysis by abstract interpretation", In FPCA, Oct. 1995, pp. 170-181.
    • (1995) In FPCA , pp. 170-181
    • Cousot, P.1    Cousot, P.2
  • 10
    • 33749833959 scopus 로고    scopus 로고
    • Cascade: C assertion checker and deductive engine
    • N. Sethi, C. Barret, "Cascade: C assertion checker and deductive engine", In CAV, 2006, pp. 166-169.
    • (2006) In CAV , pp. 166-169
    • Sethi, N.1    Barret, C.2
  • 12
    • 0020157396 scopus 로고
    • Programmers use slices when debugging
    • M. Weiser, "Programmers use slices when debugging", In Commun. ACM, 1982, pp. 446-452.
    • (1982) In Commun. ACM , pp. 446-452
    • Weiser, M.1
  • 14
    • 14344256751 scopus 로고    scopus 로고
    • Using the unravel program slicing tool to evaluate high integrity software
    • May
    • J.R. Lyle, D.R. Wallace, "Using the unravel program slicing tool to evaluate high integrity software", In Proceedings of Software Quality Week, May. 1997.
    • (1997) Proceedings of Software Quality Week
    • Lyle, J.R.1    Wallace, D.R.2
  • 16
    • 0020299274 scopus 로고
    • Specification and verification of concurrent systems in CESAR
    • Proc. Symposium on Programming, Springer
    • Queille, J.P., Sifakis, J.: Specification and verification of concurrent systems in CESAR. In: Proc. Symposium on Programming, LNCS 137. Springer, 1982, pp. 337-351.
    • (1982) LNCS , vol.137 , pp. 337-351
    • Queille, J.P.1    Sifakis, J.2
  • 17
    • 84937567800 scopus 로고    scopus 로고
    • Temporal-safety poofs for systems code
    • Proc. CAV, Springer
    • Henzinger, T.A., Jhala, R., Majumdar, R., Necula, G.C., Sutre, G., and Weimer, W., Temporal-safety poofs for systems code. In: Proc. CAV, LNCS 2404, Springer, 2002, pp. 526-538.
    • (2002) LNCS , vol.2404 , pp. 526-538
    • Henzinger, T.A.1    Jhala, R.2    Majumdar, R.3    Necula, G.C.4    Sutre, G.5    Weimer, W.6
  • 18
    • 4243189286 scopus 로고    scopus 로고
    • Counterexample-guided abstraction refinement for symbolic model checking
    • Sep
    • E. Clarke, O. Grumberg, S. Jha, Y. Lu, and H. Veith, " Counterexample-guided abstraction refinement for symbolic model checking", In J. ACM, Sep. 2003, pp. 752-794.
    • (2003) In J. ACM , pp. 752-794
    • Clarke, E.1    Grumberg, O.2    Jha, S.3    Lu, Y.4    Veith, H.5
  • 20
    • 3142766211 scopus 로고
    • ATOM: A System for Building Customized Program Analysis Tools
    • June
    • A. Srivastava, A. Eustace, "ATOM: A System for Building Customized Program Analysis Tools", In PLDI, June. 1994, pp. 528-539.
    • (1994) In PLDI , pp. 528-539
    • Srivastava, A.1    Eustace, A.2
  • 21
    • 31944440969 scopus 로고    scopus 로고
    • C. Luk, R. Cohn, R. Muth, H. Patil, A. Klauser, G. Lowney, S. Wallace, V. Reddi, and K. Hazelwood. Pin: Building Customized Program Analysis Tools with Dynamic Instrumentation, In PLDT, June. 2005, pp. 190-200.
    • C. Luk, R. Cohn, R. Muth, H. Patil, A. Klauser, G. Lowney, S. Wallace, V. Reddi, and K. Hazelwood. "Pin: Building Customized Program Analysis Tools with Dynamic Instrumentation", In PLDT, June. 2005, pp. 190-200.
  • 23
    • 56349117830 scopus 로고    scopus 로고
    • A Buffer Overflow Benchmark for Software Model. Checkers
    • K. Ku, T.E. Hart, and M. Chechik, "A Buffer Overflow Benchmark for Software Model. Checkers", In ASE, 2007, pp. 389-392.
    • (2007) In ASE , pp. 389-392
    • Ku, K.1    Hart, T.E.2    Chechik, M.3
  • 25
    • 77954504457 scopus 로고    scopus 로고
    • A Practical Dynamic Buffer Overflow Detector
    • O. Ruwase, M. Lam, "A Practical Dynamic Buffer Overflow Detector", In NDSS, 2004, pp. 159-169.
    • (2004) In NDSS , pp. 159-169
    • Ruwase, O.1    Lam, M.2
  • 27
    • 35348992492 scopus 로고    scopus 로고
    • Configurable Software Verification: Concretizing the Convergence of Model Checking and Program Analysis
    • D. Beyer, T. A. Henzinger, and G. Théoduloz, "Configurable Software Verification: Concretizing the Convergence of Model Checking and Program Analysis", In CAV, 2007, pp. 504-518.
    • (2007) In CAV , pp. 504-518
    • Beyer, D.1    Henzinger, T.A.2    Théoduloz, G.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.